What: Get a personal virtual machine within an isolated network. (playground). Get it ready to attack other machines and to be attacked. Last machine running is the winner. Full rules in progress based on the number of participants. Hack, crack, sniff, phish, social engineer... do what it takes to win. (all activity occurs within an isolated encrypted network connect via VPN)